Trojan Viruses also referred to as a Trojan horse are a type of malware that tends to be disguised and advertised as legitimate software. A common spreading method employed by hackers is to advertise their trojan as “cracked” paid software or key-generators for paid software which the victim thinks will …

Ransomware has been around for decades without much coverage, but recently it has come into the media spotlight with redesigned and improved features that has been making headlines since. Ransomware is often used as a means of extorting money – victims have had their data ‘kidnapped’ and held at ransom. …

DDoS attacks (Distributed Denial of Service Attacks) have become one of the most frequent and regulated attacks to be carried out online due to their speed, simplicity and effectiveness. It’s an attack that has affected both companies and household networks. DDoS attacks have the ability to affect multiple devices since …

I’m sure everyone has seen the stories or news articles about huge company breaches mentioning SQL attacks, so I thought I’d write an article explaining what these attacks actually are. SQL attacks have gained popularity in the past 20 years because they are effective in retrieving valuable and confidential information. These …

In today’s world, everything needs to be secured: homes, cars, families, pets, investments, companies. More recently, however, there has been a growing need for cyber security. Cyber security has a vital presence in our day to day lives. It is a necessity for everyone who uses technology. Today’s world …